Fundamental Machines Search Results

How To: Sew a frilly hair scrunchie

While scrunchies might not be that common a hair accessory anymore, you can make one of your own by following the steps in this how-to video. You will need two satin fabric pieces of 50cm, a sewing machine, sewing thread, a pair of scissors, marking pins, as well as brown and black satin fabrics. It's so easy to make, even a cat can do it. Check out this video sewing tutorial and learn how to make a frilly hair scrunchie.

How To: Make Vista run faster

Are you disappointed with the sluggishness of Microsoft Windows Vista? In this Windows video tutorial, you'll learn how to use the Performance tool in Windows Vista to disable senseless features you don't need and to make Vista run more quickly in the process. For more, or to get started speeding up your own Windows Vista machine, take a look!

How To: Avoid square backings on a quilt

Watch this video tutorial to learn how to bypass the cumbersome process of making squaring backings for your quilts. This is an attempt to show you how and why you may never want to make a perfect square backing for your longarm sewing machine again.

How To: Revamp a sweater

This week on Threadheads, the ladies of Compai are helpin' us out with a very special viewer request, plus we hang out and take a look into their popular DIY book series 99 ways. So sit back, relax, grab your sewing machine and get comfy.

How To: Make homemade pasta dough

This is a simple recipe that just uses regular AP flour. You can, of course, use a mixture of semolina flour like many pasta recipes suggest. But, this recipe is very user friendly, and if you’ve never made your own pasta before, this would be a good place to start. By the way, those pasta machines are surprisingly affordable at your local mega-store

How To: Do leg curls

This video demonstrates how to work your hamstrings by doing leg curls. The video walks you through setting up the seated leg curler machine and performing the exercises correctly.

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.

How To: Enumerate NetBIOS Shares with NBTScan & Nmap Scripting Engine

NetBIOS is a service that allows for communication over a network and is often used to join a domain and legacy applications. It is an older technology but still used in some environments today. Since it is an unsecured protocol, it can often be a good starting point when attacking a network. Scanning for NetBIOS shares with NBTScan and the Nmap Scripting Engine is a good way to begin.

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.